CDM Real Estate Company since Jan 1991
Project Manager & General Partner
Education:
CSU Chico
Skills:
Budgets Microsoft Office Process Scheduler Contract Negotiation Residential Homes Management Consulting Strategic Planning Construction Management Team Building Retail Project Planning Project Management Construction Negotiation Contractors Program Management New Business Development Team Leadership Operations Management Management Store Management Leadership
Interests:
Bird Watching Mystic Literature Fly Fishing Cooking Gardening Travel
Oct 2007 to Present Patent AttorneyTaylorMade-adidas Golf Carlsbad, CA Mar 2004 to Oct 2007 Patent AttorneyMoser, Patterson & Sheridan LLP Palo Alto, CA Oct 2002 to Mar 2004 Patent AttorneyBlakely Sokoloff Taylor & Zafman LLP Sunnyvale, CA Jun 2001 to May 2002 Patent AgentApplied Materials Inc Santa Clara, CA Jul 1994 to May 2001 Engineer
Education:
Santa Clara University School of Law Aug 1998 to May 2002 DoctorateStanford University Sep 1992 to Dec 1993 Master of Science in Mechanical EngineeringStanford University Sep 1987 to Jun 1991 Bachelor of Science in Mechanical Engineering
Us Patents
Multi-Level Cryptographic Transformations For Securing Digital Assets
Steven Toye Crocker - Redwood City CA, US Denis Jacques Paul Garcia - Palo Alto CA, US
International Classification:
G06F 12/14 G06F 21/22 G06F 21/24
US Classification:
726 27, 726 26, 726 28, 726 29, 726 30, 705 57
Abstract:
Enhanced multi-level cryptographic transformations that secure electronic files are disclosed. The secured electronic files contain not only secured data but also security information. The security information includes cryptographic structure information, access rules and secrets (e. g. , keys). The cryptographic structure information explains the multi-level cryptographic transformations associated with securing or unsecuring the electronic files. The access rules and the secrets are used by the cryptographic transformations to secure the electronic files. Since the secured electronic files contain the cryptographic structure information, the particular cryptographic transformations (including their sequencing) can vary with each electronic file, if so desired. Typically, the secured electronic files are secured and managed by a file security system, such as a distributed security system.
Methods And Systems For Providing Access Control To Secured Data
Denis Jacques Paul Garcia - Palo Alto CA, US Michael Michio Ouye - Mountain View CA, US Alain Rossmann - Palo Alto CA, US Steven Toye Crocker - Burlingame CA, US Eric Gilbertson - Menlo Park CA, US Weiqing Huang - Flower Mound TX, US Serge Humpich - Tournan-en-Brie, FR Klimenty Vainstein - San Francisco CA, US Nicholas Michael Ryan - Sunnyvale CA, US
In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all times are disclosed. According to one embodiment, a secured file or secured document includes two parts: an attachment, referred to as a header, and an encrypted document or data portion. The header includes security information that points to or includes the access rules and a file key. The access rules facilitate restrictive access to the secured document and essentially determine who/when/how/where the secured document can be accessed. The file key is used to encrypt/decrypt the encrypted data portion. Only those who have the proper access privileges are permitted to retrieve the file key to encrypt/decrypt the encrypted data portion.
Michael Ouye - Portola Valley CA, US Steven Crocker - Redwood City CA, US
Assignee:
SecretSEAL Inc. - Menlo Park CA
International Classification:
G06F017/60
US Classification:
705/051000
Abstract:
To grant or deny access rights to a user attempting to access a protected system or secured electronic data, an access right evaluation process is carried out among all applicable policies including those embedded in the secured electronic data. In a preferred embodiment, the access right evaluation process is invoked only when a system being accessed is protected or a file being accessed is detected to be in a secured format. Further, the access right evaluation process is configured preferably to operate transparently to the user. The access right evaluation may be advantageously used in systems or applications in which devices, mediums or electronic data are secured and can be restrictively accessed by those who are authenticated and have proper access privilege.
Methods And Systems For Providing Access Control To Secured Data
Denis Jacques Paul Garcia - Palo Alto CA, US Micheal Michio Ouye - Mountain View CA, US Alain Rossmann - Palo Alto CA, US Steven Toye Crocker - Burlingame CA, US Eric Gilbertson - Menlo Park CA, US Weiqing Huang - Flower Mound TX, US Serge Humpich - Tournan-en-Brie, FR Klimenty Vainstein - San Francisco CA, US Nicholas Micheal Ryan - Sunnyvale CA, US
Assignee:
Intellectual Ventures I LLC - Wilmington DE
International Classification:
G06F 21/60
US Classification:
713193
Abstract:
In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all times are disclosed. According to one embodiment, a secured file or secured document includes two parts: an attachment, referred to as a header, and an encrypted document or data portion. The header includes security information that points to or includes the access rules and a file key. The access rules facilitate restrictive access to the secured document and essentially determine who/when/how/where the secured document can be accessed. The file key is used to encrypt/decrypt the encrypted data portion. Only those who have the proper access privileges are permitted to retrieve the file key to encrypt/decrypt the encrypted data portion.